Costs can be lowered not only because augmented reality is visual and intuitive but also it can be configured at will. Product returns will be low when customers are able to virtually experience their ability to meet their needs. Transaction costs will be lower as searches can be done virtually on mobile or computer screens. Marketing and advertising costs will be lowered as customers share the immersive content that goes with them. Complex products are easier to sell when their utility is simulated in real life situations with ease. New products can be launched more easily as their use cases can be tested virtually and successful solutions communicated to customers in the context of their own environments and activities.

Cyber-security in enterprises is caught in a dangerous time warp—the long held assumption that invaluable information assets of companies can be cordoned off within a perimeter, protected by firewalls, no longer holds. The perimeter is porous with its countless access points available to a mobile and distributed workforce, and partners’ networks, with remote access rights to corporate data via the cloud.

Mobile endpoints and their use of the cloud for sharing corporate data have been found to be the most vulnerable conduit that cyber-criminals exploit for launching the most sophisticated attacks (advanced persistent threats) intended to steal intellectual property. Poneman Institute’s survey of cyber-security attacks, over twenty four months, found that 71 percent of companies reported that endpoint security risks are the most difficult to mitigate. The use of multiple mobile devices to access the corporate network was reported to be the highest risk with 60 percent reporting so. Another 50 percent considered the use of personal mobile devices for work related activity to be the highest risk. The second most important class of IT risks was considered to be thirty-party cloud applications with 66 percent reporting so. The third most important IT risk of greatest concern was reported to be Advanced Persistent threats.

In an environment of pervasive vulnerabilities, enterprises are learning to remain vigilant about anomalous behavior pointing to an impending attack from criminals. “Behavioral patterns that do not conform to the normal rhythm of daily activity, often concurrent with large volumes of traffic, are the hallmarks of a cyber-criminal,” Dr. Vincent Berk, CEO and co-founder of Flowtraq, a Big Data cyber-security firm that specializes in identifying behavioral patterns of cyber-criminals, told us. “A tell-tale sign of an imminent cyber attack is unexpected network reconnaissance activity,” he informed us. Human beings need to correlate several clues emerging from the data analysis before drawing conclusions because criminals learn new ways to evade surveillance.

Enterprises now recognize the importance of learning to recognize the “fingerprints” of cyber-criminals from their behavior. A 2014 survey by PriceWaterHouseCooper found that 20 percent of the respondents see security information and event management tools as a priority and an equal number event correlation as a priority. These technologies help to recognize behavioral patterns of cyber-criminals.

“Scalability of Big Data solutions to identify behavior of cyber-criminals is the most daunting challenge.” Dr. Vincent Berk told us. “We extract data from routers and switches anywhere in the pathway of data flows in and out of the extended enterprise,” he explained to us. “The fluidity of enterprise networks today with increasing virtualization and recourse to the cloud makes it challenging to track them,” he informed us. “Additionally, mergers and acquisitions add to the complexity as more routers and switches have to be identified and monitored,” he explained to us.

Dr. Berk underscored the importance of avoiding false positives which could lead to denial of access to legitimate users of the network and interruption of business activity. “Ideally, we want to monitor at a more granular level, including the patterns of activity on each device in use, and any departures from norm to avoid false positives,” he told us. The filter of human intelligence is still needed to isolate false positives.

“Granular monitoring is more accurate and has uncovered sophisticated intruders who hide inside virtualized private networks (VPNs) or encrypted data flows,” Dr. Berk revealed to us. Often, these sophisticated attackers have been there for years unnoticed. “The VPNs and the encryption are not cracked but the data is analyzed to understand why they are in the network,” Dr. Berk explained to us.

Cyber-security will increasingly be a battle of wits between intruders and the victims. Big Data analysis notwithstanding, cyber-criminals will find new ways to elude their hunters. The data analysis will provide clues about the ever changing methods used by cyber-criminals and means to guard against their attacks. The quality of human intelligence on either side will determine who wins.

Law enforcement faces daunting challenges and many cases go cold. Its loses the trail when it pursues criminals into the woods, fugitives are often elusive as they flee from the scene of the crime, clues don’t tell …

By Kishore Jethanandani
Consumer mobile devices are extending their reach into the enterprise, fulfilling more than communication needs of distributed workforces, as they are incorporated into business processes. A bevy of companies have launched infra-red mobile …

By Kishore Jethanandani
Mobile broadband carriers are discovering their unique latent strengths in provision of mobile enterprise platforms and applications stretching across multiple geographies. They see in the provision of a seamless mobile experience, for nationwide …

By Kishore Jethanandani
Drilling engineers navigate hazardous oil wells in earth’s dark hollows not in the manner of the swashbuckling Indiana Jones but collaboratively with staid geophysicists and geologists who parse terabytes of data to calculate …

By Kishore Jethanandani
Kondratieff cycles, which span thirty to fifty years, are marked by breakthroughs in technology and reform of institutions that drive expansion and a downturn sets in as technologies mature and unnoticed dysfunction in …

By Kishore Jethanandani
Youtube’s harum-scarum expansion of goofy user-generated content is giving way to first steps towards professional content on premium TV channels. Sports content is the linchpin for commercial TV and will likely light the …

By Kishore Jethanandani
The competitive battle between brick-and-mortar stores and on-line stores seemed like a no contest. E-commerce stores have the clinching advantage in analytics. Video analytics may well help stores disprove that presumption.
E-commerce sites learn …

By Kishore Jethanandani
Machine-to-Machine (M2M), the tiny radio devices, sensors that feed bits of data from activities of objects such as moving trucks, have a whole lot more value when the data from each of them …

Mobile device sales have tapered in developed markets. To regenerate demand, vendors are turning to tiny, low-powered MEMS (Micro-electro-mechanical systems) devices that enable novel services on smaller energy efficient devices.
Outdoor navigation was one of the …

International Procurement Operations (IPOs) are the nerve centers of decision-making for efficient global procurement operations. Expansion into low-cost countries brings within the fold of an extended enterprise a coalition of suppliers, buyers and logistics companies …

Costs can be lowered not only because augmented reality is visual and intuitive but also it can be configured at will. Product returns will be low when customers are able to virtually experience their ability to meet their needs. Transaction costs will be lower as searches can be done virtually on mobile or computer screens. Marketing and advertising costs will be lowered as customers share the immersive content that goes with them. Complex products are easier to sell when their utility is simulated in real life situations with ease. New products can be launched more easily as their use cases can be tested virtually and successful solutions communicated to customers in the context of their own environments and activities.

Autonomous business units within a larger corporation have a life of their own far removed from the efficiency concerns of headquarters. The balanced scorecard methodology lets enterprises delve deeper into financial numbers to understand the …

By Kishore Jethanandani
Drilling engineers navigate hazardous oil wells in earth’s dark hollows not in the manner of the swashbuckling Indiana Jones but collaboratively with staid geophysicists and geologists who parse terabytes of data to calculate …

By Kishore Jethanandani
Drilling engineers navigate hazardous oil wells in earth’s dark hollows not in the manner of the swashbuckling Indiana Jones but collaboratively with staid geophysicists and geologists who parse terabytes of data to calculate …

Wider adoption of remote care is now possible with the panoply of technological tools now available such as sensors, medical devices, smart mobile devices and internet video. The sensors let doctors read vital signs from a distance, robots let them do hospital rounds more frequently without being present, video lets them see a patient in another location, smart mobile devices with embedded cameras let them track emergency situations in real time and internet connections let them download images from distant storage devices.

Technological barriers to collaboration on the fly are beginning to be broken. On-premise video-conferencing solutions exist in the market today while mobile video-conferencing is in its infancy. Larger teams will need ability for point-to-multi-point video-conferencing …

International Procurement Operations (IPOs) are the nerve centers of decision-making for efficient global procurement operations. Expansion into low-cost countries brings within the fold of an extended enterprise a coalition of suppliers, buyers and logistics companies …

By Kishore Jethanandani
Kondratieff cycles, which span thirty to fifty years, are marked by breakthroughs in technology and reform of institutions that drive expansion and a downturn sets in as technologies mature and unnoticed dysfunction in …

Costs can be lowered not only because augmented reality is visual and intuitive but also it can be configured at will. Product returns will be low when customers are able to virtually experience their ability to meet their needs. Transaction costs will be lower as searches can be done virtually on mobile or computer screens. Marketing and advertising costs will be lowered as customers share the immersive content that goes with them. Complex products are easier to sell when their utility is simulated in real life situations with ease. New products can be launched more easily as their use cases can be tested virtually and successful solutions communicated to customers in the context of their own environments and activities.

Wider adoption of remote care is now possible with the panoply of technological tools now available such as sensors, medical devices, smart mobile devices and internet video. The sensors let doctors read vital signs from a distance, robots let them do hospital rounds more frequently without being present, video lets them see a patient in another location, smart mobile devices with embedded cameras let them track emergency situations in real time and internet connections let them download images from distant storage devices.

The specter of inflation has increased the appetite for capital preservation among endowments and foundations – and these investors have targeted rates of return that can’t be achieved with today’s low-yielding bonds. Alternative investments in …

By Kishore Jethanandani
Mobile broadband carriers are discovering their unique latent strengths in provision of mobile enterprise platforms and applications stretching across multiple geographies. They see in the provision of a seamless mobile experience, for nationwide …

Technological barriers to collaboration on the fly are beginning to be broken. On-premise video-conferencing solutions exist in the market today while mobile video-conferencing is in its infancy. Larger teams will need ability for point-to-multi-point video-conferencing …

Mobile device sales have tapered in developed markets. To regenerate demand, vendors are turning to tiny, low-powered MEMS (Micro-electro-mechanical systems) devices that enable novel services on smaller energy efficient devices.
Outdoor navigation was one of the …

Law enforcement faces daunting challenges and many cases go cold. Its loses the trail when it pursues criminals into the woods, fugitives are often elusive as they flee from the scene of the crime, clues don’t tell …

Customers can now see that the early CRM technologies had a modest objective of accumulating transaction data. The truth is that the “irrational optimism” about CRM clouded judgments in the 1990s. The “irrational pessimism” that …

International Procurement Operations (IPOs) are the nerve centers of decision-making for efficient global procurement operations. Expansion into low-cost countries brings within the fold of an extended enterprise a coalition of suppliers, buyers and logistics companies …

by Kishore Jethanandani
Cyber-security in enterprises is caught in a dangerous time warp—the long held assumption that invaluable information assets of companies can be cordoned off within a perimeter, protected by firewalls, no longer holds. The …